US5233658A - Method and means to limit access to computer systems - Google Patents

Method and means to limit access to computer systems Download PDF

Info

Publication number
US5233658A
US5233658A US07/680,429 US68042991A US5233658A US 5233658 A US5233658 A US 5233658A US 68042991 A US68042991 A US 68042991A US 5233658 A US5233658 A US 5233658A
Authority
US
United States
Prior art keywords
card
reader
magnetic flux
code
decipherable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US07/680,429
Inventor
James S. Bianco
James T. Madsen
Michael Ceppetelli
John S. Fahy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US07/520,763 external-priority patent/US5067155A/en
Application filed by Individual filed Critical Individual
Priority to US07/680,429 priority Critical patent/US5233658A/en
Application granted granted Critical
Publication of US5233658A publication Critical patent/US5233658A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/12Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by magnetic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/08Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
    • G06K7/082Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors
    • G06K7/087Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors flux-sensitive, e.g. magnetic, detectors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7051Using a powered device [e.g., motor]
    • Y10T70/7057Permanent magnet

Definitions

  • the present invention relates to electronic computer systems generally and, more particularly, to a novel method and means of limiting access to such computer systems and especially those systems which require the input of a security code, or password, as part of the procedure to access such systems.
  • Electronic data bases are widely used in a broad range of activities and typically are maintained in various memory devices of computer systems. Such data bases may be used for work-in-process control in manufacturing, pricing and inventory control in selling, ticket issuance, and data storage in research, to name only a very small number of actual uses.
  • the computer system in which the data bases are maintained has included in it a number of CRT terminals which may be used to both input and access data to and from the memory devices. This arrangement greatly facilitates the operation of an organization by allowing rapid input and access by a number of persons. While this is advantageous, there are many situations in which it is desired to limit access to the data bases and programs to only those persons to whom such access is authorized.
  • the program requires that the user log out when finished, but often the users forget to log out.
  • One conventional technique to achieve automatic log out is to have a "time out" period built into the computer program with which the terminal is locked out after a predetermined interval of time during which there has been no entry on the keyboard.
  • a disadvantage of this technique is that the "time out” period must be set fairly long to allow for slow users or users may stop to think for a period of time in excess of the "time out” period.
  • Another problem with the foregoing methods is that the authorized person may give his security code to the unauthorized person.
  • a further problem with methods which employ an identification card with the security code encrypted on it in bar code form is that the card may simply be copied by conventional photocopying techniques or, if the bar code is encrypted according to standard symbologies, it may be forged through the use of a standard bar code printer.
  • Another problem with computer access could arise in situations in which one person would be required to "sign in” on a CRT terminal each time an event occured.
  • One such situation is with "paperless inspections” in which it would be desirable to avoid the large amount of paperwork required. For example, if an airplane is being repaired, an inspector would inspect each repair, access a host computer through a CRT terminal using his coded identification card, and then enter data indicating that the repair had been satisfactorily made and inspected.
  • Another such situation is one which requires a supervisor to authorize the ordering of parts each time parts are ordered. Here, it would be desirable that the supervisor acess a host computer in the same way as the above inspector and then indicate that the ordering of a part is authorized.
  • a problem with either of the two foregoing example situations is that the inspector or supervisor may want to avoid the inconvenience of having to continually go to the CRT terminal and access the host computer and may, therefore, simply log in to the host computer, remove his identification card, and allow the mechanic, the parts person, or others to enter data into the host computer.
  • the card cannot be left in the card reader because it is needed as a personal identification card for the presence of, or access by, the inspector or supervisor in or to secured areas.
  • the foregoing problem can be eliminated by detecting when the identification card is removed from the reader by optically detecting the passage of a bar code, for example, and immediately terminating access to the host computer, but this method of detection can be foiled by a person inserting a piece of paper in the reader slot before removing the identification card.
  • the reader continues to output a signal to the CRT terminal indicating that the card is still in the slot.
  • Yet an additional object of the invention is to provide any of such methods and means which can be easily retrofitted to existing systems with minor hardware changes and little or no changes to existing host computer software.
  • the present invention achieves the above objects, among others, by providing, in a preferred embodiment, a method of limiting access to computer systems which method includes scrambling identification card information with time information so that the resulting code can be used for only a limited period of time, thus preventing unauthorized persons from using the code at a later time.
  • one or more ⁇ -metal shields are embedded in an identification card, thus identifying the card as being valid and also providing means to indicate when a valid card is being removed from a card reader.
  • FIG. 1 is a schematic diagram of a computer system including one aspect of the present invention.
  • FIG. 2 is a side elevation view of an identification card bearing a bar code and including another aspect of the present invention.
  • FIG. 3 is a fragmentary schematic representation of a slot bar code reader for use with the identification card of FIG. 2.
  • FIG. 1 schematically illustrates a data base input/retrieval system or the like, generally indicated by the reference numeral 10, which includes the present invention.
  • System 10 includes a host computer 12, in the memory of which it maybe assumed that a data base is stored.
  • CRT terminals 14 Connected to host computer 12 are one or more CRT terminals 14 (only one shown) each with an associated keyboard 16.
  • CRT terminal 14 Connected to CRT terminal 14 is a wedge, or keyboard emulator, 18 to which is connected data input devices, here, for illustrative purposes, a bar code reader wand 20 and a slot card reader/decoder 22.
  • Slot card reader/decoder 22 may be of the type which reads bar codes on cards inserted therein or it may be of the type which reads magnetic codes embedded in cards.
  • identification card 24 The former type of card is illustrated as identification card 24.
  • the purpose of keyboard emulator 18 is to provide an input to host computer 12 which the host computer reads as an input from the keyboard, without having to change the software in the host computer for different input devices.
  • Keyboard emulator 18 is also connected to keyboard 16 to lock the keyboard unless an identification card 24 is inserted into reader/decoder 22.
  • Identification card 24 may be any type of identification card, but it is preferably one that includes an encrypted security code such as that described in U.S. application Ser. No. 07/338,373, filed Apr. 13, 1989, by James S. Bianco, titled IDENTIFICATION MEANS WITH ENCRYPTED SECURITY CODE AND METHOD OF MAKING AND USING SAME, the disclosure of which application is made a part hereof by reference. Using such an identification card increases the degree of security.
  • access to the data bases in host computer 12 is freely available to anyone who uses CRT terminal 14.
  • Data may be inputted through keyboard 16 or by means of reading a bar code with wand 20.
  • data may be retrieved by inputting the appropriate commands on keyboard 16.
  • a potential user may be required to enter a unique security code on keyboard 16 or to enter the code by means of inserting identification card 24 into slot card reader/decoder 22, or both the entry of a security code and the insertion of an identification card may be required.
  • host computer 12 receives the security code, it provides access to the data bases.
  • a substantial limitation of the conventional systems is that, after the authorized user leaves CRT terminal 14, an unauthorized person can put the CRT terminal in "TEST MODE", read the security code, and use the security code later for unauthorized access to the data bases.
  • Reader/decoder 22 is programmed to scramble the security code, using conventional encoding techniques, the scrambling algorithm changing as a function of the current date and time.
  • Host computer 12 is likewise programmed to decode the scrambled security code, with the unscrambling algorithm changing, in the same manner, as a function of the date and the time.
  • the algorithms may change at the end of any selected interval of time, say, each hour or even each minute.
  • Host computer 12 is programmed to accept scrambled codes in a time interval somewhat greater than the time interval of changes to avoid rejecting a potential authorized user at the point of change.
  • host computer 12 If an "out-of-date" code is received, host computer 12 is programmed to not unlock CRT terminal 14, since the code was probably copied by an unauthorized user. The unauthorized user can still read the scrambled code on CRT terminal 14 in the manner described above, but the code is valid only for a limited period of time and, if the length of that period of time is selected to be short enough, having the scrambled code would be of no value to the unauthorized user.
  • identification card 4 bearing a bar code 42.
  • identification card 40 is preferably of the type described in the above-referenced U.S. Patent Application.
  • Embedded in card 40 are either or both of foil ⁇ -metal shields 44 and 46, the shields being provided to block passage of magnetic flux through the portions of card 40 where they are embedded.
  • FIG. 3 there is shown a slot bar code insertion reader 50 having a slot 52 formed therein for the insertion of card 40 (FIG. 2). Disposed on one side of slot 52 is a magnet 6 and disposed on the other side of the slot, opposite magnet 60, is a Hall effect sensor 62 which detects the presence or absence of flux from the magnet.
  • sensor 62 In use, when identification card 40 is inserted into slot 52, assuming that shield 46 is present, sensor 62 will first detect when the card is inserted and then again when it is withdrawn, by virtue of shield 46 interrupting the flux from magnet 60 to the sensor. If shield 44 is present, the flux will be interrupted anytime that card 40 is inserted in reader 50. The failure of sensor 62 to detect the presence of shields 44 and/or 46 will indicate that a valid card is not being used and the reader can then be locked out from reading the invalid card.
  • shield 44 alone is not entirely satisfactory, since one could slip a piece of foil ⁇ -metal in slot 52 before removing card 40.
  • shield 46 that technique would not work, since inserting the piece of foil ⁇ -metal when removing card 40 would simply provide indication that the card was being removed.
  • Another technique to foil the detection system could be to dispose a strong magnet (not shown) near sensor 62 to mask the second signal.
  • a second sensor 64 is placed near sensor 62 to detect a strong magnetic field, that being stronger than the one produced by magnet 60.
  • the latter aspect of the present invention can also be employed with the type of slot reader having a slot in which an identification card is inserted at one end of the slot and removed at the other end of the slot.
  • the detection of the presence of a ⁇ -metal shield would indicate that a valid type of card is being used, so that forged cards could be rejected.
  • the detection of the presence of the shield would have to occur within a short interval of time before or after the card is read, in order to reduce the opportunity for tampering.
  • the ⁇ -metal shields described above can be inserted by conventional methods in the bodies of the cards during the manufacture of the cards.
  • time domain encryption of an identification code prevents duplication of a transmitted security code, while the use of a specially encrypted security code prevents forging of the transmitted security code.

Abstract

In a preferred embodiment, a method of limiting access to computer systems which method includes scrambling identification card information with time information so that the resulting code can be used for only a limited period of time, thus preventing unauthorized persons from using the code at a later time. In another aspect of the invention, one or more μ-metal shields are embedded in an identification card, thus identifying the card as being valid and also providing means to indicate when a valid card is being removed from a card reader.

Description

This application is a U.S. division of application Ser. No. 07/520,763, filed May 9, 1990, now U.S. Pat. No. 5,067,155, issued Nov. 19, 1991.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to electronic computer systems generally and, more particularly, to a novel method and means of limiting access to such computer systems and especially those systems which require the input of a security code, or password, as part of the procedure to access such systems.
2. Background Art
Electronic data bases are widely used in a broad range of activities and typically are maintained in various memory devices of computer systems. Such data bases may be used for work-in-process control in manufacturing, pricing and inventory control in selling, ticket issuance, and data storage in research, to name only a very small number of actual uses. Often, and especially in larger data systems, the computer system in which the data bases are maintained has included in it a number of CRT terminals which may be used to both input and access data to and from the memory devices. This arrangement greatly facilitates the operation of an organization by allowing rapid input and access by a number of persons. While this is advantageous, there are many situations in which it is desired to limit access to the data bases and programs to only those persons to whom such access is authorized.
Conventionally, access to data bases is limited by means of having a potential user type in a security code at one of the CRT terminals to "unlock" access to the data bases. A problem with this method is that an unauthorized person may simply observe the keys pressed to enter the security code. As an alternative method, the potential user may insert a personal identification card with a bar code, magnetic code, or other coded identification in a slot card reader. One problem with either method is that, later, an unauthorized person can simply put the CRT terminal in "TEST MODE" to read the security code and then use the security code to gain access to the data bases. It is therefore necessary to ensure that the security code is deleted, or the terminal locked out, whenever the authorized person leaves the terminal. Frequently, the program requires that the user log out when finished, but often the users forget to log out. One conventional technique to achieve automatic log out is to have a "time out" period built into the computer program with which the terminal is locked out after a predetermined interval of time during which there has been no entry on the keyboard. A disadvantage of this technique is that the "time out" period must be set fairly long to allow for slow users or users may stop to think for a period of time in excess of the "time out" period. Another problem with the foregoing methods is that the authorized person may give his security code to the unauthorized person.
A further problem with methods which employ an identification card with the security code encrypted on it in bar code form is that the card may simply be copied by conventional photocopying techniques or, if the bar code is encrypted according to standard symbologies, it may be forged through the use of a standard bar code printer.
Another problem with computer access could arise in situations in which one person would be required to "sign in" on a CRT terminal each time an event occured. One such situation is with "paperless inspections" in which it would be desirable to avoid the large amount of paperwork required. For example, if an airplane is being repaired, an inspector would inspect each repair, access a host computer through a CRT terminal using his coded identification card, and then enter data indicating that the repair had been satisfactorily made and inspected. Another such situation is one which requires a supervisor to authorize the ordering of parts each time parts are ordered. Here, it would be desirable that the supervisor acess a host computer in the same way as the above inspector and then indicate that the ordering of a part is authorized. A problem with either of the two foregoing example situations is that the inspector or supervisor may want to avoid the inconvenience of having to continually go to the CRT terminal and access the host computer and may, therefore, simply log in to the host computer, remove his identification card, and allow the mechanic, the parts person, or others to enter data into the host computer. The card cannot be left in the card reader because it is needed as a personal identification card for the presence of, or access by, the inspector or supervisor in or to secured areas.
The foregoing problem can be eliminated by detecting when the identification card is removed from the reader by optically detecting the passage of a bar code, for example, and immediately terminating access to the host computer, but this method of detection can be foiled by a person inserting a piece of paper in the reader slot before removing the identification card. Thus, the reader continues to output a signal to the CRT terminal indicating that the card is still in the slot.
Accordingly, it is a principal object of the present invention to provide a method and means for eliminating manual entry of security codes while defeating the use of a security code by an unauthorized person.
It is an additional object of the invention to provide a method and means to prevent tampering with an identification card reader and detecting when an identification card has been removed from a reader.
It is a further object of the invention to provide a method and means to check the validity of an identification card and to prevent copying or forging of the card.
It is another object of the invention to provide a method and means to prevent copying or forging of a transmission to a host computer.
Yet an additional object of the invention is to provide any of such methods and means which can be easily retrofitted to existing systems with minor hardware changes and little or no changes to existing host computer software.
Other objects of the present invention, as well as particular features and advantages thereof, will be elucidated in, or be apparent from, the following description and the accompanying drawing figure.
SUMMARY OF THE INVENTION
The present invention achieves the above objects, among others, by providing, in a preferred embodiment, a method of limiting access to computer systems which method includes scrambling identification card information with time information so that the resulting code can be used for only a limited period of time, thus preventing unauthorized persons from using the code at a later time. In another aspect of the invention, one or more μ-metal shields are embedded in an identification card, thus identifying the card as being valid and also providing means to indicate when a valid card is being removed from a card reader.
BRIEF DESCRIPTION OF THE DRAWING
The invention will be better understood if reference is made to the accompanying drawing figures, in which:
FIG. 1 is a schematic diagram of a computer system including one aspect of the present invention.
FIG. 2 is a side elevation view of an identification card bearing a bar code and including another aspect of the present invention.
FIG. 3 is a fragmentary schematic representation of a slot bar code reader for use with the identification card of FIG. 2.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring now to the Drawing, FIG. 1 schematically illustrates a data base input/retrieval system or the like, generally indicated by the reference numeral 10, which includes the present invention. System 10 includes a host computer 12, in the memory of which it maybe assumed that a data base is stored. Connected to host computer 12 are one or more CRT terminals 14 (only one shown) each with an associated keyboard 16. Connected to CRT terminal 14 is a wedge, or keyboard emulator, 18 to which is connected data input devices, here, for illustrative purposes, a bar code reader wand 20 and a slot card reader/decoder 22. Slot card reader/decoder 22 may be of the type which reads bar codes on cards inserted therein or it may be of the type which reads magnetic codes embedded in cards. The former type of card is illustrated as identification card 24. The purpose of keyboard emulator 18 is to provide an input to host computer 12 which the host computer reads as an input from the keyboard, without having to change the software in the host computer for different input devices. Keyboard emulator 18 is also connected to keyboard 16 to lock the keyboard unless an identification card 24 is inserted into reader/decoder 22. Identification card 24 may be any type of identification card, but it is preferably one that includes an encrypted security code such as that described in U.S. application Ser. No. 07/338,373, filed Apr. 13, 1989, by James S. Bianco, titled IDENTIFICATION MEANS WITH ENCRYPTED SECURITY CODE AND METHOD OF MAKING AND USING SAME, the disclosure of which application is made a part hereof by reference. Using such an identification card increases the degree of security.
In many cases, access to the data bases in host computer 12 is freely available to anyone who uses CRT terminal 14. Data may be inputted through keyboard 16 or by means of reading a bar code with wand 20. Likewise, data may be retrieved by inputting the appropriate commands on keyboard 16. In other cases, that, in conventional systems, a and it is in these cases, that, in conventional systems, a potential user may be required to enter a unique security code on keyboard 16 or to enter the code by means of inserting identification card 24 into slot card reader/decoder 22, or both the entry of a security code and the insertion of an identification card may be required. When host computer 12 receives the security code, it provides access to the data bases. As noted above, a substantial limitation of the conventional systems is that, after the authorized user leaves CRT terminal 14, an unauthorized person can put the CRT terminal in "TEST MODE", read the security code, and use the security code later for unauthorized access to the data bases.
The present invention defeats this mode of unauthorized access as follows: Reader/decoder 22 is programmed to scramble the security code, using conventional encoding techniques, the scrambling algorithm changing as a function of the current date and time. Host computer 12 is likewise programmed to decode the scrambled security code, with the unscrambling algorithm changing, in the same manner, as a function of the date and the time. The algorithms may change at the end of any selected interval of time, say, each hour or even each minute. Host computer 12 is programmed to accept scrambled codes in a time interval somewhat greater than the time interval of changes to avoid rejecting a potential authorized user at the point of change. If an "out-of-date" code is received, host computer 12 is programmed to not unlock CRT terminal 14, since the code was probably copied by an unauthorized user. The unauthorized user can still read the scrambled code on CRT terminal 14 in the manner described above, but the code is valid only for a limited period of time and, if the length of that period of time is selected to be short enough, having the scrambled code would be of no value to the unauthorized user.
The answer of the present invention to the problem of leaving a host computer accessed while removing an identification card from a reader will now be described with reference to FIGS. 2 and 3. On FIG. 2, there is shown an identification card 4 bearing a bar code 42. Again, identification card 40 is preferably of the type described in the above-referenced U.S. Patent Application. Embedded in card 40 are either or both of foil μ- metal shields 44 and 46, the shields being provided to block passage of magnetic flux through the portions of card 40 where they are embedded.
Referring now to FIG. 3, there is shown a slot bar code insertion reader 50 having a slot 52 formed therein for the insertion of card 40 (FIG. 2). Disposed on one side of slot 52 is a magnet 6 and disposed on the other side of the slot, opposite magnet 60, is a Hall effect sensor 62 which detects the presence or absence of flux from the magnet.
In use, when identification card 40 is inserted into slot 52, assuming that shield 46 is present, sensor 62 will first detect when the card is inserted and then again when it is withdrawn, by virtue of shield 46 interrupting the flux from magnet 60 to the sensor. If shield 44 is present, the flux will be interrupted anytime that card 40 is inserted in reader 50. The failure of sensor 62 to detect the presence of shields 44 and/or 46 will indicate that a valid card is not being used and the reader can then be locked out from reading the invalid card.
The use of shield 44 alone is not entirely satisfactory, since one could slip a piece of foil μ-metal in slot 52 before removing card 40. However, with the use of shield 46, that technique would not work, since inserting the piece of foil μ-metal when removing card 40 would simply provide indication that the card was being removed.
Another technique to foil the detection system could be to dispose a strong magnet (not shown) near sensor 62 to mask the second signal. As a countermeasure, a second sensor 64 is placed near sensor 62 to detect a strong magnetic field, that being stronger than the one produced by magnet 60.
It will be understood that conventional electronic circuitry is employed to use the signals from sensor 62 to permit reading of a bar code, to interrupt bar code reading, to lock out CRT terminal 14 (FIG. 1), and/or alert supervisory personnel.
The latter aspect of the present invention can also be employed with the type of slot reader having a slot in which an identification card is inserted at one end of the slot and removed at the other end of the slot. Here, the detection of the presence of a μ-metal shield would indicate that a valid type of card is being used, so that forged cards could be rejected. Preferably, the detection of the presence of the shield would have to occur within a short interval of time before or after the card is read, in order to reduce the opportunity for tampering.
The μ-metal shields described above can be inserted by conventional methods in the bodies of the cards during the manufacture of the cards.
It can be seen, then, that the use of a μ-metal shield in an identification card prevents the copying of the identification card by conventional means, since the absence of the shield will be detected by the readers of the present invention. Use of the specifically encrypted security code prevents forging of the card, since the special code is not dicipherable without a special reader.
Furthermore, it can be seen that, according to the present invention, removal of an identification card from a card reader will lock out the terminal system and that employment of the reader of the present invention with cards containing μ-metal shields prevents tampering with the reading system.
Additionally, time domain encryption of an identification code prevents duplication of a transmitted security code, while the use of a specially encrypted security code prevents forging of the transmitted security code.
It will further be appreciated that any of the aspects of the present invention can easily be incorporated into existing computer systems by relatively simple reprogramming and minor equipment changes.
It will thus be seen that the objects set forth above, among those made apparent from the preceding description, are efficiently attained and, since certain changes may be made in the above construction without departing from the scope of the invention, it is intended that all matter contained in the above description or shown on the accompanying drawing figures shall be interpreted as illustrative only and not in a limiting sense.
It is also to be understood that the following claims are intended to cover all of the generic and specific features of the invention herein described and all statements of the scope of the invention which, as a matter of language, might be said to fall therebetween.

Claims (21)

I claim:
1. A method of terminating access to a computer system, comprising:
(a) providing a mu-metal shield at a selected location in an identification card;
(b) providing a slot card insertion reader having disposed therewithin a source of magnetic flux and a first magnetic flux sensor disposed to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow, said source of magnetic flux and said first magnetic flux sensor being disposed such that, upon insertion of said card in said slot card reader, said mu-metal shield will interrupt said flow of magnetic flux to said sensor;
(c) inserting said card in said card reader, thereby permitting access to said computer;
(d) determining when said card is withdrawn from said slot card reader by detecting when said flow of magnetic flux is interrupted for a first interval upon insertion of said card in said slot card insertion reader and for a second interval upon removal of said card from said slot card insertion reader, said flow of magnetic flux being detected between said first and second intervals, and the determination of when said card is withdrawn occurs after the second resumption of said magnetic flux flow; and
(e) terminating said access to said computer system when said magnetic flux detection is resumed.
2. A method, as defined in claim 1, wherein said flow of magnetic flux is interrupted throughout the time said card is inserted in said slot card insertion reader.
3. A method of terminating access to a computer system, comprising:
(a) providing a mu-metal shield at a selected location in an identification card;
(b) providing a slot card insertion reader having disposed therewithin a source of magnetic flux and a first magnetic flux sensor disposed to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow, said source of magnetic flux and said first magnetic flux sensor being disposed such that, upon insertion of said card in said slot card reader, said mu-metal shield will interrupt said flow of magnetic flux to said sensor;
(c) inserting said card in said card reader, thereby permitting access to said computer;
(d) determining when said card is withdrawn from said slot card reader by detecting the resumption of said magnetic flux detection by said first sensor after the interruption thereof;
(e) providing in said slot card insertion reader a second magnetic flux sensor to detect the presence of a strong magnetic field, stronger than that produced by said source of magnetic flux; and
(e) terminating said access to said computer system either when said magnetic flux detection is resumed or when said strong magnetic field is detected.
4. A method, as defined in claim 3, wherein said flow of magnetic flux is interrupted throughout the time said card is inserted in said slot card insertion reader.
5. A method, as defined in claim 3, wherein said card includes an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second dicipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
6. A method, as defined in claim 5, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
7. A slot card reader for permitting access to a computer system in response to a card inserted therein, said card having a mu-metal shield at a selected location in said card, said slot card reader comprising:
(a) a source of magnetic flux;
(b) a magnetic flux sensor to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow;
(c) said source of magnetic flux and said magnetic flux sensor being disposed within said slot card reader such that, upon insertion of said card in said reader, said mu-metal shield will interrupt said flow of magnetic flux to said sensor, thereby indicating the validity of said card; and
(d) means to permit access to said computer system when said card is determined to be valid; and wherein said card includes an identification code in the form of a bar code and wherein said bar code comprises:
(e) a first decipherable code containing first information encrypted according to a standard symbology;
(f) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(g) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(h) said second decipherable code being decipherable only with said unique decoding reader.
8. A slot card reader, as defined in claim 7, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
9. A slot card insertion reader for terminating access to a computer system when an identification card has been removed therefrom, said card having a mu-metal shield at a selected location in said card, said slot card insertion reader comprising:
(a) a source of magnetic flux;
(b) a first magnetic flux sensor to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow;
(c) said source of magnetic flux and said first magnetic flux sensor being disposed within said slot card reader such that, upon insertion of said card in said reader, said mu-metal shield will interrupt said flow of magnetic flux to said first sensor for a first interval, and, upon removal of said card from said slot card insertion reader, said mu-metal shield will interrupt said flow of magnetic flux for a second interval, after which said flow of flux will resume, thereby indicating that said card has been withdrawn; and
(d) means to terminate access to said computer system when said flow of flux resumes.
10. A slot card insertion reader, as defined in claim 9, wherein said flow of magnetic flux is interrupted throughout the time said card is inserted in said slot card insertion reader.
11. A slot card insertion reader for terminating access to a computer system when an identification card has been removed therefrom, said card having a mu-metal shield at a selected location in said card, said slot card insertion reader comprising:
(a) a source of magnetic flux;
(b) a first magnetic flux sensor to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow;
(c) said source of magnetic flux and said first magnetic flux sensor being disposed within said slot card reader such that, upon insertion of said card in said reader, said mu-metal shield will interrupt said flow of magnetic flux to said first sensor, and, upon removal of said card from said slot card insertion reader, said flow of flux will resume, thereby indicating that said card has been withdrawn;
(d) a second magnetic flux sensor to detect the presence of a strong magnetic field, stronger than that produced by said source of magnetic flux; and
(e) means to terminate access to said computer system either when said flow of flux resumes or when said strong magnetic field is detected.
12. A slot card insertion reader, as defined in claim 11, wherein said flow of magnetic flux is interrupted throughout the time said card is inserted in said slot card insertion reader.
13. A slot card insertion reader, as defined in claim 11, wherein said card includes an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
14. An identification card for use with a slot card reader for determining the validity of identification cards, said card reader including a source of magnetic flux, a magnetic flux sensor to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow, and said source of magnetic flux and said magnetic flux sensor being disposed within said slot card reader such that, upon insertion of an identification card, having a mu-metal shield disposed at a selected location in said card, in said reader, said mu-metal shield will interrupt said flow of magnetic flux to said sensor, thereby indicating the validity of said card, said identification card comprising a mu-metal shield disposed at said selected location; and said identification card including an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
15. An identification card, as defined in claim 14, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
16. An identification card for use with a slot card insertion reader for determining when an identification card has been removed therefrom, said slot card insertion reader including a source of magnetic flux, a first magnetic flux sensor to detect the flow of said magnetic flux thereto and to produce an output signal indicative of the presence of said flow, said source of magnetic flux and said first magnetic flux sensor being disposed within said slot card reader such that, upon insertion of an identification card, having a mu-metal shield disposed at a selected location in said card, in said slot card insertion reader, said mu-metal shield will interrupt said flow of magnetic flux to said first sensor, and, upon removal of said card from said slot card insertion reader, said flow of flux will resume, thereby indicating that said card has been withdrawn, said identification card comprising a mu-metal shield disposed at said selected location; and said identification card including an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
17. An identification card, as defined in claim 16, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
18. A method, as defined in claim 1, wherein said card includes an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
19. A method, as defined in claim 18, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
20. A slot card insertion reader, as defined in claim 9, wherein said card includes an identification code in the form of a bar code and wherein said bar code includes:
(a) a first decipherable code containing first information encrypted according to a standard symbology;
(b) a second decipherable code containing second information encrypted according to a unique symbology, said second information including at least a portion of said first information;
(c) said first decipherable code being decipherable with either a standard decoding reader or a unique decoding reader; and
(d) said second decipherable code being decipherable only with said unique decoding reader.
21. A slot card insertion reader, as defined in claim 20, wherein:
(a) said first decipherable code is an identification code; and
(b) said second decipherable code is a security code.
US07/680,429 1990-05-09 1991-04-04 Method and means to limit access to computer systems Expired - Lifetime US5233658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US07/680,429 US5233658A (en) 1990-05-09 1991-04-04 Method and means to limit access to computer systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/520,763 US5067155A (en) 1990-05-09 1990-05-09 Method and means to limit access to computer systems
US07/680,429 US5233658A (en) 1990-05-09 1991-04-04 Method and means to limit access to computer systems

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US07/520,763 Division US5067155A (en) 1990-05-09 1990-05-09 Method and means to limit access to computer systems

Publications (1)

Publication Number Publication Date
US5233658A true US5233658A (en) 1993-08-03

Family

ID=27060253

Family Applications (1)

Application Number Title Priority Date Filing Date
US07/680,429 Expired - Lifetime US5233658A (en) 1990-05-09 1991-04-04 Method and means to limit access to computer systems

Country Status (1)

Country Link
US (1) US5233658A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5298725A (en) * 1992-12-15 1994-03-29 Trw Inc. Bar code security system
US5450491A (en) * 1993-08-26 1995-09-12 At&T Corp. Authenticator card and system
US5555303A (en) * 1992-11-17 1996-09-10 Stambler; Leon Secure transaction system and method utilized therein
US5564016A (en) * 1993-12-17 1996-10-08 International Business Machines Corporation Method for controlling access to a computer resource based on a timing policy
US5694470A (en) * 1993-11-17 1997-12-02 Telub Teknik Ab System for reading encrypted information, and unit for use in such a system
EP0818722A1 (en) * 1996-07-05 1998-01-14 Hewlett-Packard Company Controlling apparatus behaviour upon addition/removal of a physical resource
US5719382A (en) * 1996-07-22 1998-02-17 Ncr Corporation Display peripheral incorporating a wedge interface
US5742683A (en) * 1995-12-19 1998-04-21 Pitney Bowes Inc. System and method for managing multiple users with different privileges in an open metering system
US5812762A (en) * 1995-03-31 1998-09-22 Samsung Electronics Co., Ltd. Personal computer having card read/write controller
US5836010A (en) * 1995-03-14 1998-11-10 Samsung Electronics Co., Ltd. Personal computer using chip-in card to prevent unauthorized use
US5841868A (en) * 1993-09-21 1998-11-24 Helbig, Sr.; Walter Allen Trusted computer system
US6073240A (en) * 1997-10-28 2000-06-06 International Business Machines Corporation Method and apparatus for realizing computer security
US6119932A (en) * 1997-02-18 2000-09-19 Protech Video Security, Inc. Identification verification apparatus and method
US6175356B1 (en) 1997-01-28 2001-01-16 Samsung Electronics Co., Ltd. Remotely controlled computer system
US6473060B1 (en) * 1996-02-17 2002-10-29 Samsung Electronics Co., Ltd. Monitor control device and control method thereof
US6483424B1 (en) * 1991-10-21 2002-11-19 James S. Bianco Electronic lock and key apparatus and method
US20030048173A1 (en) * 2001-09-06 2003-03-13 Satoshi Shigematsu Authentication method, authentication system, and authentication token
US20030151125A1 (en) * 2000-07-07 2003-08-14 Fujitsu Limited IC card
US6665800B1 (en) 1999-01-26 2003-12-16 Dell Usa, L.P. System and method for securing a computer system
US20040143737A1 (en) * 2003-01-20 2004-07-22 Mordechai Teicher System, method, and apparatus for visual authentication
US20110231204A1 (en) * 1999-10-22 2011-09-22 Pompare Technologies, Inc. Method and Apparatus for Controlling An Infusion Pump or the Like
US11182571B2 (en) * 2019-01-17 2021-11-23 Nidec Sankyo Corporation Magnetic recording medium processing device and control method

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3154761A (en) * 1961-03-20 1964-10-27 Daniel N Garrett Security system
US3465131A (en) * 1966-05-27 1969-09-02 Robert S Ten Eyck Metallic coded card with magnetic reed switch reader
US3564214A (en) * 1968-11-18 1971-02-16 Ind Instrumentations Inc Control article having conductive inserts for use in a control system
US3896292A (en) * 1973-06-18 1975-07-22 Michael May Hall effect position coded card detector
US4112292A (en) * 1976-08-17 1978-09-05 Access Control Systems Proprietary Limited Magnetic identification apparatus
US4213039A (en) * 1978-10-16 1980-07-15 Automatic Parking Devices, Inc. Dynamic card reader
US4253017A (en) * 1978-05-31 1981-02-24 Whitehead Edwin N Magnetically coded identification card
US4414821A (en) * 1982-07-06 1983-11-15 Jing Li G Ice rink refrigerant distribution means
US4629875A (en) * 1982-12-03 1986-12-16 Macome Corporation Verifying device for a key card
US4879645A (en) * 1984-03-31 1989-11-07 Kabushiki Kaisha Toshiba Data processing device with high security of stored programs
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
US5014325A (en) * 1985-02-01 1991-05-07 Nihon Eiwan Denshikiki Co., Ltd. Apparatus for discriminating specified sorts of printed matters
US5083309A (en) * 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3154761A (en) * 1961-03-20 1964-10-27 Daniel N Garrett Security system
US3465131A (en) * 1966-05-27 1969-09-02 Robert S Ten Eyck Metallic coded card with magnetic reed switch reader
US3564214A (en) * 1968-11-18 1971-02-16 Ind Instrumentations Inc Control article having conductive inserts for use in a control system
US3896292A (en) * 1973-06-18 1975-07-22 Michael May Hall effect position coded card detector
US4112292A (en) * 1976-08-17 1978-09-05 Access Control Systems Proprietary Limited Magnetic identification apparatus
US4253017A (en) * 1978-05-31 1981-02-24 Whitehead Edwin N Magnetically coded identification card
US4213039A (en) * 1978-10-16 1980-07-15 Automatic Parking Devices, Inc. Dynamic card reader
US4414821A (en) * 1982-07-06 1983-11-15 Jing Li G Ice rink refrigerant distribution means
US4629875A (en) * 1982-12-03 1986-12-16 Macome Corporation Verifying device for a key card
US4879645A (en) * 1984-03-31 1989-11-07 Kabushiki Kaisha Toshiba Data processing device with high security of stored programs
US5014325A (en) * 1985-02-01 1991-05-07 Nihon Eiwan Denshikiki Co., Ltd. Apparatus for discriminating specified sorts of printed matters
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
US5083309A (en) * 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6483424B1 (en) * 1991-10-21 2002-11-19 James S. Bianco Electronic lock and key apparatus and method
US5793302A (en) * 1992-11-17 1998-08-11 Stambler; Leon Method for securing information relevant to a transaction
US5555303A (en) * 1992-11-17 1996-09-10 Stambler; Leon Secure transaction system and method utilized therein
US5974148A (en) * 1992-11-17 1999-10-26 Stambler; Leon Method for securing information relevant to a transaction
US5298725A (en) * 1992-12-15 1994-03-29 Trw Inc. Bar code security system
US5450491A (en) * 1993-08-26 1995-09-12 At&T Corp. Authenticator card and system
US5841868A (en) * 1993-09-21 1998-11-24 Helbig, Sr.; Walter Allen Trusted computer system
US5694470A (en) * 1993-11-17 1997-12-02 Telub Teknik Ab System for reading encrypted information, and unit for use in such a system
US5564016A (en) * 1993-12-17 1996-10-08 International Business Machines Corporation Method for controlling access to a computer resource based on a timing policy
US5836010A (en) * 1995-03-14 1998-11-10 Samsung Electronics Co., Ltd. Personal computer using chip-in card to prevent unauthorized use
US5812762A (en) * 1995-03-31 1998-09-22 Samsung Electronics Co., Ltd. Personal computer having card read/write controller
US5742683A (en) * 1995-12-19 1998-04-21 Pitney Bowes Inc. System and method for managing multiple users with different privileges in an open metering system
USRE44957E1 (en) * 1996-02-17 2014-06-24 Samsung Electronics Co., Ltd. Monitor control device and control method thereof
US6473060B1 (en) * 1996-02-17 2002-10-29 Samsung Electronics Co., Ltd. Monitor control device and control method thereof
US5968142A (en) * 1996-07-05 1999-10-19 Hewlett-Packard Company Behavior control of apparatus having a physically-removable resource
EP0818722A1 (en) * 1996-07-05 1998-01-14 Hewlett-Packard Company Controlling apparatus behaviour upon addition/removal of a physical resource
US5719382A (en) * 1996-07-22 1998-02-17 Ncr Corporation Display peripheral incorporating a wedge interface
US6175356B1 (en) 1997-01-28 2001-01-16 Samsung Electronics Co., Ltd. Remotely controlled computer system
US6119932A (en) * 1997-02-18 2000-09-19 Protech Video Security, Inc. Identification verification apparatus and method
US6073240A (en) * 1997-10-28 2000-06-06 International Business Machines Corporation Method and apparatus for realizing computer security
US6665800B1 (en) 1999-01-26 2003-12-16 Dell Usa, L.P. System and method for securing a computer system
US20110231204A1 (en) * 1999-10-22 2011-09-22 Pompare Technologies, Inc. Method and Apparatus for Controlling An Infusion Pump or the Like
US9750872B2 (en) 1999-10-22 2017-09-05 B. Braun Medical Inc. Method and apparatus for controlling an infusion pump or the like
US9757509B2 (en) 1999-10-22 2017-09-12 B. Braun Medical Inc. Method and apparatus for controlling an infusion pump or the like
US20030151125A1 (en) * 2000-07-07 2003-08-14 Fujitsu Limited IC card
US6766961B2 (en) * 2000-07-07 2004-07-27 Fujitsu Limited IC card
US20030048173A1 (en) * 2001-09-06 2003-03-13 Satoshi Shigematsu Authentication method, authentication system, and authentication token
US20040143737A1 (en) * 2003-01-20 2004-07-22 Mordechai Teicher System, method, and apparatus for visual authentication
US7065645B2 (en) * 2003-01-20 2006-06-20 Mordechai Teicher System, method, and apparatus for visual authentication
US11182571B2 (en) * 2019-01-17 2021-11-23 Nidec Sankyo Corporation Magnetic recording medium processing device and control method

Similar Documents

Publication Publication Date Title
US5067155A (en) Method and means to limit access to computer systems
US5233658A (en) Method and means to limit access to computer systems
US5877483A (en) Method and apparatus for automatically implementing computer power on and logon functions using encoded ID card
US3857018A (en) Controlled access systems
US5408536A (en) Machine security systems
US5162638A (en) Process for protection against fraudulent use of smart cards, and device for use of the process
EP0372692B1 (en) Identification means with encrypted security code
KR101077396B1 (en) Room entering/leaving management system and room entering/leaving management method
MXPA04006475A (en) System and method of reading a security clearance card.
KR100275638B1 (en) Ic card and personal data identifying system operative therewith
JP4744326B2 (en) Security system using IC card
CA2439426A1 (en) User identification with an improved password input method
EP0973118A3 (en) Fingerprint checking system, fingerprint checking method and memory card used for the same
JP2004145437A (en) Personal identification system and method, security system and id information reading system
JPH06203241A (en) Control unit for card for room entrance and exiting
JPH1063742A (en) Financial organ system with accident dealing function
JPH05314138A (en) Going in-and-out managing device
JPS62206653A (en) Illegal use preventing device for computer system
JPH02213972A (en) Illegal use preventing method for computer
RU2123204C1 (en) Method for detection of passwords and images for image recognition
JP4523110B2 (en) AUTHORIZATION PROVIDING METHOD, ITS EXECUTION DEVICE, AND RECORDING MEDIUM RECORDING THE PROCESSING PROGRAM
JPS6266375A (en) Truth and falsehood discriminator for card
JPS63268086A (en) Registering/collating method for personal identification number or the like
JPH09282435A (en) Ic card device
JPH05250389A (en) Customer recognition system

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12